Georg T. Becker
Orcid: 0000-0002-1200-1508
  According to our database1,
  Georg T. Becker
  authored at least 27 papers
  between 2010 and 2024.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2024
    Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
    
  
  2022
Automated benchmark network diversification for realistic attack simulation with application to moving target defense.
    
  
    Int. J. Inf. Sec., 2022
    
  
  2021
    IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
    
  
  2020
    Proc. Priv. Enhancing Technol., 2020
    
  
    IACR Cryptol. ePrint Arch., 2020
    
  
    Proceedings of the 17th ACM International Conference on Computing Frontiers, 2020
    
  
  2019
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice.
    
  
    IEEE Trans. Dependable Secur. Comput., 2019
    
  
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance.
    
  
    Proceedings of the Smart Card Research and Advanced Applications, 2019
    
  
  2018
    IEEE Trans. Computers, 2018
    
  
Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques.
    
  
    Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
    
  
  2017
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice.
    
  
    IACR Cryptol. ePrint Arch., 2017
    
  
    Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017
    
  
  2016
    Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
    
  
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.
    
  
    Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
    
  
  2015
    IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
    
  
On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation.
    
  
    Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015
    
  
    Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI, 2015
    
  
    Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015
    
  
    Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015
    
  
  2014
    IACR Cryptol. ePrint Arch., 2014
    
  
  2013
    Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013
    
  
  2012
    IEEE Trans. Inf. Forensics Secur., 2012
    
  
  2011
    Proceedings of the IEEE 29th International Conference on Computer Design, 2011
    
  
  2010
    Proceedings of the HOST 2010, 2010
    
  
    Proceedings of the Data and Applications Security and Privacy XXIV, 2010